Received: by 10.213.65.68 with SMTP id h4csp52434imn; Mon, 12 Mar 2018 06:29:47 -0700 (PDT) X-Google-Smtp-Source: AG47ELteJ8Hg3yFURqAjD/ALvb2+2u/qdwN+TeJyMnN6CLBgZ7yOybshetBbwKC0ucoKa9qrTmWc X-Received: by 2002:a17:902:9686:: with SMTP id n6-v6mr8075609plp.331.1520861387032; Mon, 12 Mar 2018 06:29:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1520861386; cv=none; d=google.com; s=arc-20160816; b=aciItGAd06UiaozAUJKNuKqtMsUHPIAlY/yLB0QjWG2SOOP9M3ytMYCme3isdBX6lm AT6yr+odu4TS2l3KNXjcfMMrEZFJw0aFSEQ4iiUUtvPLYbmoryEW55f6cbjYmoILObOi Le6PHl/IEySBVAhjd13FeIFvoW4IMIzqOgXFTdgsK+ni0PE4r3o8EtQsXq2XtpfvCKnR +Frbf5VX0x7v7T1YOS5R4ijXBXf+dqGq083ghLSHS6gbXnFZl6hf1S2qym3M8wDMzZdd VWcRfvSCCq4xlpRb7YlWx7QoL+XuuViyO+oSdcFPAyRgWy/GEXkQApm+CTw9LU0UkHF0 5lvA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dmarc-filter:arc-authentication-results; bh=AAgHTg+UvZeEcJMPoRsa8Um+meX3gCzJpp0tvPc3P9A=; b=l3spkPjD3BsS7dAjyPkw+p5Svb6H0Erx6uIVnMs74ifqoGCan9HrteYb4G08OLyUY3 VmCsX9M/RHObFc0TqKLHQ/8S940c11fEs5IqmGyLsh3x7gLN/Ei+tg4kICRRdIuSl8lp eknKHwOZqqAHKUJ5F3IVs4ZUyo991G0+v0ok/gE3Q77QV9z5hhKLw1S2pTSE0vdnopNQ dz47pxuM2j6nVT6SyZvLZwnv6pdgKDSFANXRBhhVbuNe1qD/4UZIsM+pw3fUzTRBG+ku tbg8pEMwep1OWgE162NOPs0KOggNs1IPByui8z3yFGDTHzM7tR+XOZ+Hg6rapYl3q1Q5 x+/g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l4-v6si6015283plb.68.2018.03.12.06.29.32; Mon, 12 Mar 2018 06:29:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751452AbeCLN2d (ORCPT + 99 others); Mon, 12 Mar 2018 09:28:33 -0400 Received: from mail.kernel.org ([198.145.29.99]:46944 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751379AbeCLN2b (ORCPT ); Mon, 12 Mar 2018 09:28:31 -0400 Received: from redbean.localdomain (ipbcc3dd5e.dynamic.kabel-deutschland.de [188.195.221.94]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 70039204EF; Mon, 12 Mar 2018 13:28:29 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 70039204EF Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=jeyu@kernel.org Date: Mon, 12 Mar 2018 14:28:25 +0100 From: Jessica Yu To: Jia Zhang Cc: linux-kernel@vger.kernel.org Subject: Re: [PATCH v2 0/4] modsign enhancement Message-ID: <20180312132823.dixp7gkjypjlgymt@redbean.localdomain> References: <1520483223-6596-1-git-send-email-zhang.jia@linux.alibaba.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: <1520483223-6596-1-git-send-email-zhang.jia@linux.alibaba.com> X-OS: Linux redbean 4.15.3-200.fc26.x86_64 x86_64 User-Agent: NeoMutt/20171215 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org +++ Jia Zhang [08/03/18 12:26 +0800]: >This patch series allows to disable module validity enforcement >in runtime through /sys/kernel/security/modsign/enforce interface. > >Assuming CONFIG_MODULE_SIG_FORCE=y, here are the instructions to >disable the validity enforcement. > ># cat /sys/kernel/security/modsign/enforce ># echo -n 0 > data ># openssl smime -sign -nocerts -noattr -binary -in data \ > -inkey -signer -outform der \ > -out /sys/kernel/security/modsign/enforce > >Now enable enforcement again on demand. > ># echo 1 > /sys/kernel/security/modsign/enforce > >Changelog: >v2: >- Support to disable validity enforcement in runtime. NAK - please use /sys/module/module/parameters/sig_enforce. And I would rather keep this parameter bool_enable_only, plain and simple. What use case do you have/why would you want to disable signature enforcement - after having enabled it - during runtime? None of this is explained nor justified in the cover letter. Thanks, Jessica